A command-line toolkit designed for ethical hackers and network security enthusiasts using Kali Linux. This tool simplifies scanning WiFi networks, capturing handshakes, and generating crack commands through an easy-to-use, interactive menu.
Caution
This tool is intended for Authorized security testing ONLY.
Using this tool on networks without explicit, written permission from the owner is illegal. The developer is not responsible for any misuse or damage caused by this program. Use responsibly.
- Automatic Monitor Mode: Automatically enables and disables monitor mode on your wireless adapter.
- Network Scanning: Scans for all nearby WiFi networks using
airodump-ng. - WPA/WPA2 Handshake Capture: Easily targets a specific network (by BSSID and channel) to capture WPA/WPA2 handshakes.
-
Clone the repository:
git clone https://github.com/trmxvibs/wifi-audit-tool.git cd wifi-audit-tool -
Make the install script executable:
chmod +x install.sh
-
Run the installer (this will use
sudoto install dependencies):./install.sh
Always run the tool with sudo (root) privileges:
sudo python3 wifi_audit.py-
Error: "Error detecting interfaces: Command ['iw', 'dev'] returned non-zero exit status 1"
-
This is the most common error when running Kali Linux inside an Android/Termux environment (like Nethunter).
-
Cause: The Android OS security model blocks the Kali "guest" OS from directly accessing your phone's internal WiFi chip. The iw dev command cannot find any compatible hardware.
-
Solution: You cannot use your phone's built-in WiFi for this. You must use an external USB WiFi adapter.
-
OTG Adapter: A USB-C or Micro USB adapter to connect the USB adapter to your phone.
-
External WiFi Adapter: A USB WiFi adapter that is Kali-compatible and supports monitor mode (e.g., adapters with Atheros AR9271 or Ralink RT5370 chipsets).